APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯

Ðû²¼Ê±¼ä 2025-05-16

1. APT28ʹÓÃXSSÎó²î¶Ô¶àÓʼþϵͳ·¢¶¯ÍøÂçÌØ¹¤Ðж¯


5ÔÂ15ÈÕ £¬Ë¹Âå·¥¿ËÍøÂçÇå¾²¹«Ë¾ESET×îÐÂÑо¿·¢Ã÷ £¬Óë¶íÂÞ˹ÓйØÁªµÄÍþв×éÖ¯Õë¶ÔRoundcube¡¢Horde¡¢MDaemonºÍZimbraµÈÖ÷Á÷ÓʼþϵͳʵÑéÁËÃûΪ¡°Operation RoundPress¡±µÄÍøÂçÌØ¹¤Ô˶¯¡£´Ë´ÎÐж¯½¹µãÄ¿µÄÊÇÇÔÈ¡ÌØ¶¨ÓÊÏäÕË»§µÄÉñÃØÊý¾Ý £¬Ö÷ÒªÊܺ¦ÕßΪ¶«Å·Õþ¸®»ú¹¹¼°¾ü¹¤ÆóÒµ £¬Í¬Ê±·ÇÖÞ¡¢Å·ÖÞºÍÄÏÃÀÖÞµÄÕþ¸®²¿·ÖÒ²Ôâµ½¹¥»÷¡£Ñо¿Ö°Ô±½«Æä¹éÒòÓÚ¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯APT28 £¬ÒÀ¾Ý°üÀ¨´¹ÂÚÓʼþ·¢¼þµØÖ·ÖصþºÍ·þÎñÆ÷ÉèÖÃÊÖ·¨ÏàËÆ¡£¹¥»÷Õßͨ¹ýÓʼþϵͳµÄXSSÎó²îÔÚÍøÒ³ÓÊÏä½çÃæÖ´ÐÐí§ÒâJavaScript´úÂë¡£ÆäÖÐ £¬MDaemonµÄXSSÎó²îÔÚ¹¥»÷³õÆÚΪÁãÈÕÎó²î £¬ËäºóÐøÒÑÐÞ¸´ £¬µ«ÆäʱδÐÞ¸´¡£APT28ͨ¹ýµç×ÓÓʼþ·¢ËÍXSSÎó²îʹÓóÌÐò £¬¶ñÒâ´úÂëÔÚä¯ÀÀÆ÷ÔËÐеÄÍøÒ³ÓÊÏä¿Í»§¶ËÖÐÖ´ÐС£Îó²îʹÓÃÀֳɺó £¬ÃûΪSpyPressµÄ»ìÏýJavaScriptÓÐÓÃÔØºÉ»áÇÔÈ¡ÓÊÏ䯾֤¡¢ÓʼþÄÚÈݺÍÁªÏµÈËÐÅÏ¢ £¬²¿·Ö±äÖÖ»¹Äܽ¨ÉèSieve¹æÔò £¬Ò»Á¬×ª·¢ÐÂÓʼþÖÁ¹¥»÷ÕßÓÊÏä¡£ÇÔÈ¡µÄÊý¾Ýͨ¹ýHTTP POSTÇëÇó·¢ËÍÖÁC2·þÎñÆ÷ £¬Ä³Ð©±äÖÖ»¹Äܲ¶»ñµÇ¼¼Í¼¡¢2FA´úÂë £¬ÉõÖÁΪMDAEMON½¨ÉèÓ¦ÓÃÃÜÂë¡£


https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html


2. Coinbase¿Í»§Êý¾Ýй¶ £¬Ô¤¼ÆËðʧ´ï4ÒÚ


5ÔÂ15ÈÕ £¬¼ÓÃÜÇ®±ÒÉúÒâËùCoinbaseÅû¶ £¬ÍøÂç·¸·¨·Ö×ÓÓë¶ñÒâÍâÑó¿Í·þÖ°Ô±ºÏ×÷ÇÔÈ¡Á˿ͻ§Êý¾Ý £¬²¢Ë÷Òª2000ÍòÃÀÔªÊê½ðÒÔ²»¹ûÕæ±»µÁÐÅÏ¢¡£Coinbase¾Ü¾øÖ§¸¶Êê½ð £¬µ«ÉèÁ¢2000ÍòÃÀÔª½±Àø»ù½ð £¬ÒÔÃãÀøÌṩÓйع¥»÷ÕßµÄÏßË÷¡£´Ëǰ £¬ºÚ¿ÍÏòCoinbase·¢Ë͵ç×ÓÓʼþÍþвÐû²¼¿Í»§ÕË»§ºÍÄÚ²¿ÎļþÐÅÏ¢ £¬CoinbaseÊӲ췢Ã÷¹¥»÷ÕßÔÚÃÀ¹ú¾³Íâ³Ð°üÉÌ»òÖ§³ÖÖ°Ô±µÄ×ÊÖúÏ»ñÈ¡Á˿ͻ§Êý¾Ý £¬ÕâЩְԱÊܹͻá¼ûÄÚ²¿ÏµÍ³ £¬Coinbase·¢Ã÷ºóÒÑ¿ª³ýÏà¹ØÖ°Ô±¡£Ö»¹ÜÍþвÐÐΪÕßÇÔÈ¡ÁËCoinbaseÔ¼1%¿Í»§µÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢ £¬µ«ÎÞ·¨»ñÈ¡¿Í»§Ë½Ô¿¡¢ÃÜÂë»ò»á¼ûCoinbase PrimeÕË»§ºÍÇ®°ü¡£±»µÁÊý¾Ý°üÀ¨ÐÕÃû¡¢µØÖ·¡¢µç»°¡¢µç×ÓÓʼþ¡¢²¿·ÖÉç»á°ü¹ÜºÅ¡¢ÒøÐÐÕ˺ÅÐÅÏ¢¡¢Õþ¸®Éí·Ý֤ͼÏñ¡¢ÕË»§Êý¾Ý¼°ÓÐÏ޵Ĺ«Ë¾Êý¾Ý¡£CoinbaseÇ¿µ÷ûÓÐÃÜÂ롢˽Կ»ò×ʽðй¶ £¬²¢½«Åâ³¥±»ÓÕÆ­Ïò¹¥»÷Õß»ã¿îµÄ¿Í»§¡£ËäÈ»²ÆÎñÓ°ÏìÈÔÔÚÆÀ¹ÀÖÐ £¬µ«CoinbaseÔ¤¼Æµ÷½âºÍ¿Í»§Åâ³¥ÓöȽ«ÔÚ1.8ÒÚÃÀÔªÖÁ4ÒÚÃÀÔªÖ®¼ä¡£Îª±ÜÃâδÀ´Î¥¹æÐÐΪ £¬CoinbaseÍýÏ뿪ÉèеÄÖ§³ÖÖÐÐÄÅâ³¥ÊÜÓ°Ïì¿Í»§ £¬²¢ÔöÌí¶ÔÄÚ²¿Íþв¼ì²â¡¢Çå¾²ÍþвģÄâºÍ×Ô¶¯ÏìÓ¦µÄͶ×Ê¡£


https://www.bleepingcomputer.com/news/security/coinbase-discloses-breach-faces-up-to-400-million-in-losses/


3. ¶ñÒâNPM°üʹÓÃUnicodeÒþдÊõÀ´Ìӱܼì²â


5ÔÂ15ÈÕ £¬´úÂëÇå¾²ÆÀ¹À¹«Ë¾Veracode·¢Ã÷ £¬Node°ü¹ÜÀíÆ÷Ë÷ÒýÖб£´æÃûΪ¡°os-info-checker-es6¡±µÄ¶ñÒâÈí¼þ°ü £¬¸Ã°ü×Ô±¾Ô³õÒÔÀ´Òѱ»ÏÂÔØÁè¼Ý1000´Î¡£¸ÃÈí¼þ°ü×î³õ°æ±¾ÓÚ3ÔÂ19ÈÕÉÏ´«ÖÁNPM £¬×î³õ¹¦Ð§½öÊÇÍøÂç²Ù×÷ϵͳÐÅÏ¢ £¬¿´ËÆÎÞº¦¡£È»¶ø £¬¼¸Ììºó £¬×÷Õß¶ÔÈí¼þ°ü¾ÙÐÐÁËÐÞ¸Ä £¬Ìí¼ÓÁËÌØ¶¨ÓÚÆ½Ì¨µÄ¶þ½øÖÆÎļþºÍ»ìÏýµÄ×°Öþ籾¡£5ÔÂ7ÈÕ £¬¸ÃÈí¼þ°üÐû²¼Ð°汾 £¬ÆäÖаüÀ¨ÓÃÓÚת´ï×îÖÕÓÐÓÃÔØºÉµÄÖØ´óC2£¨ÏÂÁîºÍ¿ØÖÆ£©»úÖÆ´úÂë¡£VeracodeÖÒÑÔ³Æ £¬Ä¿½ñnpmÉÏ¿ÉÓõÄ×îа汾v1.0.8Ϊ¶ñÒâ°æ±¾¡£±ðµÄ £¬¸ÃÈí¼þ°ü»¹±»ÁÐΪÆäËûËĸöNPMÈí¼þ°üµÄÒÀÀµÏî £¬µ«ÏÖÔÚÉв»ÇåÎúÕâЩÈí¼þ°üÊÇ·ñ»òÔõÑù±»ÍþвÐÐΪÕßÍÆ¹ã¡£ÔÚ¶ñÒâ°æ±¾ÖÐ £¬¹¥»÷ÕßʹÓÃUnicodeÒþдÊõ £¬½«Êý¾ÝǶÈë¿´ËÆ¡°|¡±µÄ×Ö·û´®ÖÐ £¬¶øÊúÏߺóÒþ²ØÁËÒ»³¤´®²»¿É¼ûµÄUnicode×Ö·û £¬ÕâЩ×Ö·ûÓÃÓÚÔö½ø»ùÓÚÎı¾µÄÒþдÊõ¡£Veracodeͨ¹ý½âÂëºÍ·´»ìÏý×Ö·û´® £¬ÕÒµ½ÁËÖØ´óC2»úÖÆµÄÓÐÓÃÔØºÉ £¬¸Ã»úÖÆÒÀÀµGoogleÈÕÀú¶ÌÁ´½ÓµÖ´ïÍйÜ×îÖÕÓÐÓÃÔØºÉµÄλÖá£Ñо¿Ö°Ô±Ú¹ÊÍÁË´Ó»ñÈ¡GoogleÈÕÀúÁ´½Óµ½×îÖÕ½âÂë»ñÈ¡¶ñÒâÈí¼þÓÐÓÃÔØºÉµÄÕû¸öÀú³Ì £¬²¢Ö¸³ö×îÖÕÓÐÓÃÔØºÉ¿ÉÄܾ­ÓɼÓÃÜ¡£


https://www.bleepingcomputer.com/news/security/malicious-npm-package-uses-unicode-steganography-to-evade-detection/


4. Ó¡µÚ°²ÄÉÖÝÕþ¸®ÖÒÑÔ£ºÐ¡ÐÄð³ä¹Ù·½ÓʼþµÄͨÐзÑÕ©Æ­


5ÔÂ13ÈÕ £¬Ó¡µÚ°²ÄÉÖÝÕþ¸®»ú¹¹ÓÚÖܶþÏòסÃñ·¢³öÖÒÑÔ £¬ÒªÇóɾ³ýʹÓÃÖÝÕþ¸®¹Ù·½µç×ÓÓʼþµØÖ··¢Ë͵ÄÐéαµç×ÓÓʼþ¡£ÕâЩ´¹ÂÚÓʼþÀ´×Ô¶à¸öÖÝÕþ¸®²¿·Ö £¬°üÀ¨¶ùͯ·þÎñ²¿¡¢ÈüÂíίԱ»áµÈ £¬ËüÃÇÓÕÆ­ÐԵؼû¸æÊÕ¼þÈ˱£´æÎ´½ÉÄɵÄͨÐÐ·Ñ £¬²¢ÍþвÈô²»½ÉÄɽ«ÃæÁÙ¾­¼Ã´¦·£»ò³µÁ¾¹ÒºÅ±»¿ÛÁô¡£Óʼþ×îºó³£ÒÔ¡°Ð»Ð»Äú £¬TxTag ¿Í·þ¡±×÷ΪÊðÃû £¬²¢°üÀ¨ÒÉËÆ¶ñÒâÍøÕ¾µÄÁ´½Ó¡£Ó¡µÚ°²ÄÉÖÝÁìÍÁÇå¾²²¿Í¨¹ýÊÖÒհ칫ÊÒÔÚXƽ̨Ðû²¼ÐÂÎÅ £¬ÌáÐѹ«ÖÚСÐÄ´ËÀàÕ©Æ­¡£ÉùÃ÷Ö¸³ö £¬ÖÝÕþ¸®²»»áͨ¹ý¶ÌÐÅ»òµç×ÓÓʼþ·¢ËÍδ½ÉͨÐзÑ֪ͨ £¬²¢ÌåÏÖÊÖÒհ칫ÊÒÕýÓëÉæÊ¹«Ë¾ºÏ×÷ £¬ÒÔ×èÖ¹ÈκνøÒ»²½µÄͨѶ¡£¾ÝÏàʶ £¬ÖÝÕþ¸®ÓÚÈ¥ÄêÄêµ×ÖÕÖ¹ÁËÓëÒ»¼Òδǩ×Ö¹©Ó¦É̵ÄÌõÔ¼ £¬µ«Î´É¾³ý¸ÃÖݵÄÕË»§¡£´Ë´ÎÊÂÎñÖÐ £¬Ò»Ãû³Ð°üÉ̵ÄÕË»§Ôâµ½ºÚ¿Í¹¥»÷ £¬²¢±»ÓÃÓÚ·¢ËÍÕâЩÐéαÐÅÏ¢ £¬¶øÖÝϵͳ²¢Î´·¢Ã÷ÈëÇÖ¼£Ïó¡£µç×ÓÓʼþ½ØÍ¼ÏÔʾ £¬ÕâЩÐÅÏ¢ÊÇͨ¹ýµ¤·ðÈí¼þ¹«Ë¾GranicusµÄÈí¼þGovDelivery Communications Cloud·Ö·¢µÄ¡£Granicus½²»°ÈËSharon RushenÌåÏÖ £¬¸ÃÊÂÎñ²¢Î´ÉìÕÅÖÁÆä×ÔÉíÆ½Ì¨ £¬ÏµÍ³ÊÇÇå¾²µÄ¡£ËýÖ¸³ö £¬ÎÊÌâÔ´ÓÚ¹ÜÀíÔ±Óû§ÕË»§±»ÈëÇÖ £¬¿ÉÄÜÊÇͨ¹ýÍÆ²âƾ֤»òÉç½»¹¤³ÌÊֶλñÈ¡¡£


https://statescoop.com/indiana-phishing-attack-contractor-hacked/


5. FrigidStealerͨ¹ýÐéαä¯ÀÀÆ÷¸üй¥»÷macOSÓû§


5ÔÂ15ÈÕ £¬FrigidStealer¶ñÒâÈí¼þÕýͨ¹ýÐéαä¯ÀÀÆ÷¸üÐÂÌáÐѹ¥»÷macOSÓû§ £¬¸Ã±äÖÖÓÚ2025Äê2ÔÂÊ״α»·¢Ã÷ £¬²¢ÒѲ¨¼°±±ÃÀ¡¢Å·ÖÞºÍÑÇÖÞµÄÓû§¡£´Ë¶ñÒâÈí¼þÁ¥ÊôÓÚFerret¶ñÒâÈí¼þ¼Ò×å £¬ÓëTA2726ºÍTA2727²¡¶¾ÓÐ¹Ø £¬Á½Õß¾ùÒÔʹÓÃÐéαä¯ÀÀÆ÷¸üÐÂΪ¹¥»÷ÊֶζøÖø³Æ¡£¸Ã¶ñÒâÈí¼þαװ³ÉSafari¸üеĴÅÅÌÓ³ÏñÎļþ£¨DMG£© £¬ÓÕÆ­Óû§ÏÂÔØ²¢×°Öá£×°ÖÃÀú³ÌÖÐ £¬Ëü»áÌáÐÑÓû§ÊäÈëÃÜÂë £¬´Ó¶øÈƹýAppleµÄGatekeeper±£»¤»úÖÆ £¬²¢½èÖúÄÚÖõÄAppleScript¹¦Ð§Ö´ÐжñÒâ²Ù×÷¡£×°Öúó £¬Ëü»áαװ³ÉÒ»¸ö´øÓÐÌØ¶¨bundle IDµÄ¶ñÒâÓ¦Óà £¬ÓëÕýµ±Ó¦ÓûìÏýÊÓÌý¡£Ò»µ©¼¤»î £¬FrigidStealer±ã×îÏÈÍøÂçÓû§µÄÃô¸ÐÊý¾Ý £¬°üÀ¨ä¯ÀÀÆ÷ƾ֤¡¢ÏµÍ³Îļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÐÅÏ¢¼°Apple NotesµÈ £¬²¢Í¨¹ýmacOSµÄmDNSResponder·ÓɵÄDNSÅÌÎÊ £¬½«ÕâЩÊý¾Ýй¶µ½ÏÂÁîÓë¿ØÖÆ·þÎñÆ÷¡£ÇÔÈ¡Êý¾Ýºó £¬¸Ã¶ñÒâÈí¼þ»á×ÔÎÒÖÕÖ¹ £¬ÒÔ½µµÍ±»·¢Ã÷µÄΣº¦¡£¾Ý¿ªÔ´ÍøÂçÇå¾²¹«Ë¾WazuhÅû¶ £¬FrigidStealer²¢²»ÒÀÀµ¹Å°åµÄÎó²îʹÓù¤¾ß°ü»òÎó²î £¬¶øÊÇʹÓÃÓû§¶Ôϵͳ֪ͨºÍä¯ÀÀÆ÷¸üÐÂÌáÐѵÄÐÅÈξÙÐй¥»÷ £¬ÕâʹµÃËü¸üΪΣÏÕÇÒÓÐÓᣱðµÄ £¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃmacOSÌØÓеÄÐÐΪÀ´¼á³Ö³¤ÆÚÐÔ £¬Í¨¹ý×¢²áΪǰ̨ӦÓóÌÐòµÈ·½·¨Óëϵͳ½»»¥ £¬²¢ÔÚÖ´Ðкóɾ³ý×ÔÉíºÛ¼£ £¬ÒÔ¼á³ÖÒþ²Ø¡£


https://hackread.com/frigidstealer-malware-macos-fake-safari-browser-update/


6. ÕÐÆ¸Æ½Ì¨HireClick570Íò·Ý¼òÀúÔâй¶


5ÔÂ15ÈÕ £¬CybernewsÑо¿Ö°Ô±¿ËÈÕ·¢Ã÷Ò»Æð´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ £¬ÈªÔ´Ö¸ÏòÃæÏòÖÐСÐÍÆóÒµµÄÕÐÆ¸Æ½Ì¨HireClick¡£ÓÉÓÚÑÇÂíÑ·AWS S3´æ´¢Í°ÉèÖùýʧ £¬¸Ãƽ̨Áè¼Ý570Íò·ÝÎļþ±»Ì»Â¶ÔÚ»¥ÁªÍøÉÏ £¬ÆäÖÐÖ÷ÒªÊÇÇóÖ°ÕߵļòÀú £¬ÕâЩÎļþй¶ÁËÇóÖ°ÕßµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¼°¾ÍÒµÐÅÏ¢µÈÃô¸ÐºÍ˽ÈËÊý¾Ý¡£´Ë´ÎÊý¾Ýй¶¶ÔHireClick¿Í»§µÄÓ°ÏìÉîÔ¶¡£Ð¹Â¶µÄÊý¾ÝÒ»µ©ÂäÈë²»·¨·Ö×ÓÖ®ÊÖ £¬¿ÉÄܱ»ÓÃÓÚÉí·Ý͵ÇÔ¡¢Ã°³ä¡¢ÍøÂç´¹ÂڵȶàÖÖÕ©Æ­Ô˶¯¡£¹¥»÷Õß¿ÉÄٰܼçÕÐÆ¸Ë¾Àí £¬Ê¹ÓÃй¶µÄÐÅÏ¢ÓÕÆ­ÇóÖ°ÕßÌṩÉí·Ý֤ɨÃè¼þ¡¢Éç»áÇå¾²ºÅÂëÉõÖÁÒøÐÐÐÅÏ¢ £¬»òͨ¹ýµç»°ÓÕÆ­ÇóÖ°ÕßÍ¸Â¶ÒøÐÐÐÅÏ¢»ò×°ÖöñÒâÈí¼þ¡£±ðµÄ £¬Õ©Æ­Õß»¹¿ÉʹÓÃй¶µÄ¼òÀú½¨ÉèÐéαÉí·Ý¾ÙÐоÍÒµÑéÖ¤Õ©Æ­ £¬ÉõÖÁð³äÇóÖ°Õß½øÈëÊÂÇ鳡ºÏϵͳ¡£ÕâÖÖÊý¾Ýй¶ÐÐΪµÄΣº¦²»µ«ÏÞÓÚÊý¾Ý͵ÇÔ×Ô¼º £¬»¹¿ÉÄÜÒý·¢ÍøÂçÈËÈâËÑË÷ £¬¼´¶ñÒâÆØ¹â˽ÈËÐÅÏ¢ÒÔɧÈÅ»òÏÅ»£ËûÈË¡£¹¥»÷ÕßÕÆÎÕÁËÊܺ¦ÕßµÄÈ«Ãû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂëºÍÏÖʵµØÖ· £¬¾ÍÄÜÈÝÒ×Ëø¶¨²¢É§ÈÅÊܺ¦Õß¡£


https://cybernews.com/security/hireclick-resume-database-data-leak/